CN105868079A - Method for Java memory inefficient usage detection based on memory usage propagation analysis - Google Patents
Method for Java memory inefficient usage detection based on memory usage propagation analysis Download PDFInfo
- Publication number
- CN105868079A CN105868079A CN201610251576.4A CN201610251576A CN105868079A CN 105868079 A CN105868079 A CN 105868079A CN 201610251576 A CN201610251576 A CN 201610251576A CN 105868079 A CN105868079 A CN 105868079A
- Authority
- CN
- China
- Prior art keywords
- memory
- internal memory
- program
- software
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Debugging And Monitoring (AREA)
Abstract
Provided is a method for Java memory inefficient usage detection based on memory usage propagation analysis. The method for Java memory inefficient usage detection based on memory usage propagation analysis comprises a step 1) of performing static analysis on software and performing instrumentation, and obtaining event information relevant with memory usage through dynamic execution; a step 2) of performing memory usage propagation analysis according to the obtained information and constructing a memory usage propagation map; a step 3) of performing feature analysis identification on memory usage information contained in the memory usage propagation map, and detecting the problem of inefficient usage of a memory in software; a step 4) of performing context path analysis on the software, detecting a root cause resulting in the problem, and performing positioning and repairing against the problem. The problem that inefficient usage of a software memory cannot be effectively detected through an existing test method is solved, software performances and expansibility are greatly improved, software test working efficiency is improved, and thus the product quality is controlled better.
Description
Technical field
The invention belongs to software testing technology field, and feature has been invented a kind of use based on internal memory and propagated analysis
Java Memory Low Usage uses detection method.
Background technology
Software test is one is intended to the inquiry activity that helper applications practitioner assesses the quality condition of tested software.?
In complete software development flow, software test activity is carried throughout, occupies the most of the time of development project, needs
Substantial amounts of human and material resources puts into.Software test procedure outstanding, successful can be found out present in tested software product
Mistake, defect, inefficacy and accident, thus helper applications product development person carries out the most effective reparation and changes software product
It is apt to, and improves the quality of software product, shorten the gap between software product and the product demand developed, soft by develop
The quality and functionality deviation of part product controls within tolerance interval.
Memory Low Usage uses and refers to exist in program process the memory consumption of bulk redundancy, i.e. memory consumption and these
The contribution that internal memory execution normal to program brings is uneven (the most excessive memory consumption is to complete simple program task).Existing
Becoming increasingly complex for software systems, large-scale framework intensity software gets more and more so that Memory Low Usage uses problem generally to exist.
Substantial amounts of research shows that Memory Low Usage uses problem can affect the runnability of software, and is difficult to diagnose and repair.Along with program
Execution scale constantly expand, if Memory Low Usage in program uses problem to concentrate triggering under high operating load, will cause
Program feature significantly reduces, and hinders and reaches intended performance indications, even initiator collapse.Therefore, make for Memory Low Usage
Carry out studying most important by problem.
Summary of the invention
Present invention aim at providing a kind of use based on internal memory to propagate the Java Memory Low Usage use detection method analyzed,
The method of testing that the present invention presently, there are can not effectively inspection software Memory Low Usage use problem, the performance of software is substantially improved
And extensibility, improve Experience of Software Testing Work efficiency, thus better control over the quality of product.
For reaching above-mentioned purpose, the present invention proposes a kind of use based on internal memory and propagates the Java Memory Low Usage use inspection analyzed
Survey method.Method comprises the following steps:
1) internal memory uses the collection of relevant information, the byte code files of java applet is carried out static analysis, by wherein
Relevant statement is used to carry out pitching pile to carry out acquisition of information to internal memory.Owing to the memory consumption of object-oriented program is the most right
The establishment of elephant and use are caused, and object is made up of method and field.Therefore, acquisition relates to three kinds of things that internal memory uses
Part: Object Creation, method call and field access.
2) internal memory uses the structure propagating figure (MUPG), uses the memory usage information that step 1) obtains, superfluous by eliminating
Remaining memory usage information is simplified, be polymerized and use propagation figure (MUPG, Memory Usage into internal memory
Propagation Profiling).The structure of MUPG comprises two parts: polymerization internal memory uses event and polymerisation loop structure.
3) signature analysis, program internal memory poor efficiency uses and mainly shows as the program execution that object memory consumption brings with it
Imbalance between contribution, by internal storage access rate, memory usage and interim Memory Allocation rate three category feature analysis, detects journey
In sequence, Memory Low Usage that may be present uses problem;
Signature analysis 1: internal storage access rate
The computing formula of internal storage access rate (Memory Access Rate, MAR) is:
Wherein,Represent the total accessed number of times of object type, its be method call number of times () visit with field
Ask number of times () sum,Represent the object number created;
Signature analysis 2: memory usage
The computing formula of memory usage (Memory Utilization Rate, MUR) is:
Wherein,Represent object type effectively utilizes the time,The time point being initially utilized for this object type,
The time point being finally utilized for this object type.Represent the existence time that this object type object is total, its
InRepresent the time point that last object of this object type is released,Represent that this object type first is right
As the time point being created.
Signature analysis 3: interim Memory Allocation rate
The computing formula of interim Memory Allocation rate (Temporary Memory Allocation Rate, TMAR) is:
Wherein,Representation program perform during i-th GC moment a certain object type keep quote object number () with this moment created object number () ratio,Representation program completely perform during GC number;
By above three category feature analyses, detect the suspect object type causing program internal memory poor efficiency to use.Obtain suspicious
After object type, according to the object number of object type, suspicious object type is carried out importance ranking;
4) context path analysis, step 3) after obtaining there is the suspect object type that Memory Low Usage uses problem, foundation
The contextual information that MUPG provides carries out internal memory and uses propagation to analyze, and studies these object types shadow by which program area
Ring, analyze the program area causing Memory Low Usage to use.When internal memory uses and propagates analysis, each path branches is calculated it
Importance value W, by arranging threshold value, filters out those paths less on memory consumption impact, obtains causing Memory Low Usage to make
Critical path.
If node A is node to be analyzed, it is called by multiple father nodes, and B is a father node of A, then father node B antithetical phrase
The importance value of node AComputing formula be:
Wherein,Represent the number of times that between node B and node A, path performs,Represent node A father node a certain with it i it
Between path perform number of times, N represents total number of the father node of node A.
The detailed process of context path analysis is: threshold value, node to be analyzed and MUPG are tied as input, path analysis
Fruit is as output.During path analysis, threshold value t is set, only meets or exceeds t when the W value of the father node of analysis node
Time, just continue this father node is carried out path analysis.Finally give the main program execution route causing Memory Low Usage to use.
Further, wherein above-mentioned steps 1) specifically comprise the following steps that
Step 1)-1: initial state;
Step 1)-2: Java software is carried out static analysis, carries out pitching pile to the statement being directed to internal memory use;
Step 1)-3: perform program, obtains internal memory in program process and uses event information;
Step 1)-4: every internal memory uses the content of event message, the information such as time is deposited into database;
Step 1)-5: the acquisition of software memory use event message is complete;
Further, wherein above-mentioned steps 2) specifically comprise the following steps that
Step 2)-1: initial state;
Step 2)-2: from database, read the internal memory being not handled by use event message;
Step 2)-3: use the type of event, event to occur the static address at place that the information obtained is gathered according to internal memory
Conjunction processes;
Step 2)-4: analyzing the direct dependence of information after polymerization processes, the most whether detection exists loop structure, if
Exist, circulation result therein is carried out polymerization process;
Step 2)-5: internal memory uses propagation figure to generate complete;
Further, wherein above-mentioned steps 3) specifically comprise the following steps that
Step 3)-1: initial state;
Step 3)-2: the software memory for generating uses propagates figure, by internal storage access rate, memory usage and interim internal memory
Apportionment ratio three category feature analysis, whether the object set that the node in detection figure comprises exists Memory Low Usage uses problem.Calculate
Method is as follows: internal memory is used to each node propagated in figure, the size of its three category features value of analytical calculation:
Characteristic value 1: internal storage access rate
Characteristic value 2: memory usage
Characteristic value 3: interim Memory Allocation rate
Step 3)-3: select threshold value n of a signature analysis according to the actual memory service condition of software;
Step 3)-4: the signature analysis value of each node compared with n, if signature analysis value is less than threshold value n, then will
It is classified as the suspect node that there is Memory Low Usage use problem;
Step 3)-5: all of suspect node be ranked up according to the memory size consumed, obtains suspicious Memory Low Usage and uses
Node listing;
Further, wherein above-mentioned steps 4) specifically comprise the following steps that
Step 4)-1: initial state;
Step 4)-2: read the suspect object type node report list obtained;
Step 4)-3: obtain the important object relevant to suspect object type and create address (according to the object number size created
It is ranked up) and object use address (being ranked up according to the size performing number of times);
Step 4)-4: Object Creation address and object use address to each suspect object type carry out context path and divide
Analysis;
Step 4)-5: by arranging threshold value during path analysis, calculates the importance value of path branches, it is thus achieved that important road
Footpath;
Step 4)-6: the context path information causing Memory Low Usage to use is reported to responsible developer;
The present invention uses the method for program pitching pile to use event information to the internal memory collecting in software running process, can be effective
The internal memory service condition of program is monitored;Internal memory is used to use the method propagating analysis to study in software running process
Deposit the detailed process of consumption, and by the method for signature analysis, the region that there is Memory Low Usage use in software is positioned;
Finally the suspect object type detected is carried out context path analysis, obtain the basic reason causing problem to produce, help
Software developer carries out defect repair, improves Experience of Software Testing Work efficiency, thus better controls over the quality of product.
Accompanying drawing explanation
Fig. 1 is that a kind of the use based on internal memory of the embodiment of the present invention propagates the Java Memory Low Usage use detection method analyzed
Flow chart.
Fig. 2 is the flow chart of the collection that software memory uses message in Fig. 1.
Fig. 3 is the flow chart that in Fig. 1, software memory uses that propagation figure builds.
Fig. 4 is the flow chart that in Fig. 1, software features is analyzed.
Fig. 5 is the flow chart of context of software path analysis in Fig. 1.
Detailed description of the invention
In order to know more about the technology contents of the present invention, especially exemplified by specific embodiment and coordinate institute's accompanying drawings to be described as follows.
Fig. 1 is that a kind of the use based on internal memory of the embodiment of the present invention propagates the Java Memory Low Usage use detection method analyzed
Flow chart.
A kind of use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, it is characterised in that under including
Row step:
S101 internal memory uses the collection of relevant information, the byte code files of java applet is carried out static analysis, by it
In use relevant statement to carry out pitching pile to carry out acquisition of information to internal memory.Owing to the memory consumption of object-oriented program is mainly
The establishment of object and use are caused, and object is made up of method and field.Therefore, acquisition relates to three kinds of things that internal memory uses
Part: Object Creation, method call and field access.;
S103 internal memory uses the structure propagating figure, uses the memory usage information that step 1) obtains, by eliminating redundancy to internal memory
Use information simplifies, and is polymerized and uses propagation figure into internal memory.Internal memory uses the structure of propagation figure to comprise two parts: poly-
Close internal memory and use event and polymerisation loop structure;
S105 signature analysis, the software memory for generating uses propagates figure, by internal storage access rate, memory usage and interim
Memory Allocation rate three category feature analysis, whether the object set that the node in detection figure comprises exists Memory Low Usage uses problem,
And node is carried out importance ranking;
S107 context path is analyzed, and the suspect node ranking that the existence Memory Low Usage obtained according to signature analysis uses, to joint
Point carries out path analysis morning and afternoon, obtains the basic reason causing program internal memory poor efficiency to use.And by analysis result and program source
Code information combines, and is reported by detailed diagnostic result and carries out problem understanding and reparation to software developer.
Fig. 2 is the flow chart that internal memory uses relevant information.By the byte code files to java applet
Carry out pitching pile, use relevant Object Creation, method call and variables access three class event to be monitored to internal memory, and store
In database.Specifically comprise the following steps that
Step 1: initial state;Step 2: Java software is carried out static analysis, is carried out the statement being directed to internal memory use
Pitching pile;Step 3: perform program, obtains internal memory in program process and uses event information;Step 4: every internal memory is used
The content of event message, the information such as time is deposited into database;Step 5: the acquisition of software memory use event message is complete;
Fig. 3 is to build internal memory to use the flow chart of propagation figure, uses the memory usage information that step 1) obtains, by eliminating redundancy
Memory usage information is simplified, is polymerized and uses propagation figure into internal memory.Specifically comprise the following steps that
Step 1: initial state;Step 2: read the internal memory being not handled by from database and use event message;Step 3:
The static address that place occurs according to the type of event, event carries out polymerization process to the information obtained;Step 4: analyze polymerization
The direct dependence of information after process, carries out polymerization process to loop structure therein;Step 5: internal memory uses propagates figure
Generate complete.
Fig. 4 is characterized the flow chart of analysis.Software memory for generating uses propagates figure, by internal storage access rate, interior
Depositing utilization rate and interim Memory Allocation rate three category feature analysis, whether the object set that the node in detection figure comprises exists internal memory
Poor efficiency uses problem, and node is carried out importance ranking.Specifically comprise the following steps that
Step 1: initial state;Step 2: by three category feature analyses, obtains internal memory and uses three classes of each node in propagation figure
Characteristic value size;Step 3: select threshold value n of a signature analysis according to the actual memory service condition of software;Step 4: will be each
The characteristic value of individual node compares with n, finds out the suspect node that there is Memory Low Usage use problem;Step 5: by suspect node
It is ranked up according to memory consumption size, obtains the node listing that suspicious Memory Low Usage uses;Step 6: internal memory uses propagates figure
Build complete.
The flow chart that Fig. 5 context path is analyzed.The suspicious joint that the existence Memory Low Usage obtained according to signature analysis uses
Point ranking, carries out path analysis morning and afternoon, obtains the basic reason causing program internal memory poor efficiency to use node.And analysis is tied
Fruit is combined with program's source code information, reports detailed diagnostic result to software developer.Specifically comprise the following steps that
Step 1: initial state;Step 2: read the suspect object type node report list obtained;Step 3: it is suspicious right to obtain
The Object Creation address relevant as type and object use address;Step 4: the Object Creation address to each suspect object type
Address is used to carry out context path analysis with object;Step 5: by arranging threshold value during path analysis, calculates path
The importance value of branch, it is thus achieved that important path;Step 6: the context path information causing Memory Low Usage to use is reported to negative
Duty developer;Step 7: context path is analyzed complete.
In sum, the present invention solves the problem that the software memory poor efficiency use problem that presently, there are is difficult to detect, no
Software memory poor efficiency is only greatly improved and uses efficiency and the accuracy of problem detection, and improve software memory problem detection
Automaticity, and then improve Experience of Software Testing Work efficiency, thus better control over the quality of product.
Claims (5)
1. one kind uses the Java Memory Low Usage propagating analysis to use detection method based on internal memory, it is characterised in that first by journey
Internal memory in sequence uses abstract the use for internal memory of event information to propagate figure, provides, with this, the internal memory behavior that program is complete, the most logical
Crossing and internal memory behavior is carried out signature analysis identification, the Memory Low Usage being detected and determined in program uses problem, last according to internal memory
The context path information analysis using propagation figure to provide causes the program area that problem produces, and is automatically made by software memory poor efficiency
Distribute to the software developer of correspondence with defect report, software developer, according to software deficiency report positioning software defect, goes forward side by side
Row is repaired;The method comprises the following steps:
1) internal memory uses the collection of relevant information, the byte code files of java applet is carried out static analysis, by wherein
Relevant statement is used to carry out pitching pile to carry out acquisition of information to internal memory;The establishment of the memory consumption of program mainly object and making
With caused, and object is made up of method and field;Therefore, we obtain and relate to three kinds of events that internal memory uses:
1. Object Creation;Object Creation is the immediate cause causing heap memory to consume, and is therefore monitored Object Creation event
The initiation point causing a large amount of memory consumption of program can be analyzed;
2. method call;Method call is the major way that in program process, each data structure interprocedual is mutual, is also
The principal mode utilizing the object created, therefore is monitored obtaining program process to method call event
In contact between each data structure, analyze distinct program region incidence relation on memory consumption, obtain object simultaneously
Service condition;
3. field accesses;Object is made up of method and field two parts, it is judged that whether object is used except to method call thing
Outside part is monitored, it is also very important content that monitoring field accesses;
By using event to be monitored three class internal memories, it is possible to obtain heap memory complete in program process uses letter
Breath, i.e. causes the concrete internal memory behavior of memory consumption;
2) internal memory uses the structure propagating figure (MUPG);
After obtaining internal memory use event letter, by eliminating redundancy, memory usage information is simplified, be polymerized as internal memory
Use and propagate figure (MUPG);The structure of MUPG comprises two parts:
(1) polymerization internal memory uses event
Definition 1: polymerization internal memory uses event to comprise following four determinant attribute, i.e. description, environment, input and export;
Describe: represent the overall description that software memory uses, for the abstract internal memory behavior representing software, analyze the interior of software
Deposit service condition;
Environment: include software environment and the hardware environment of running software;
Input: include that the three class internal memories got use event information;
Output: the result after polymerization analysis;
The internal memory using step 1) to get uses event information, and static address similar events type occurred according to event enters
Row polymerization, and according to descriptions, environment, the format organization that inputs, export, Automatic Combined becomes a software memory use mould
Type;
(2) polymerisation loop structure
Program process easily occurs the recursive call between method, causes MUPG comprises loop structure;Use strong continune
The loop structure being directed to is detected by structure detection algorithm, and uses single node to be indicated;For representing each
The node of loop structure, as an entirety;Similar with step 1, the loop structure node comprising identical content is carried out
Packet aggregation, uses single node to be indicated;
3) signature analysis;
Program internal memory poor efficiency uses the injustice mainly shown as between object memory consumption and its program execution contribution brought
Weighing apparatus;By internal storage access rate, memory usage and interim Memory Allocation rate three category feature analysis, that may be present in detection program
Memory Low Usage uses problem;
Signature analysis 1: internal storage access rate
In program process, it is understood that there may be some object types create a large amount of object, but these objects are rarely used,
Obviously this is the phenomenon that a kind of internal memory is used inefficiently;Internal storage access rate (Memory Access Rate, MAR) is a certain
Object type is accessed the ratio between number of times and this object type object number, and ratio is the least, then this object type institute is described
The possibility that the internal memory consumed is used inefficiently is the biggest;The computing formula of MAR is:
(1)
Wherein,Represent the total accessed number of times of object type, its be method call number of times () visit with field
Ask number of times () sum,Represent the object number created;
Signature analysis 2: memory usage
In program process, it is understood that there may be after some objects are created in a large number, the most only in the short period of its life cycle
It is utilized in Duan, it is clear that this is also the phenomenon that a kind of internal memory is used inefficiently;These objects use in end and are finally released
Longer period in, will bootlessly expend a large amount of memory source, the performance of program will be caused to be had a strong impact on;Memory usage
(Memory Utilization Rate, MUR) is the time that the object of a certain object type is actually utilized and deposits with total
Ratio between the time;The computing formula of MUR value is:
(2)
Wherein,Represent object type effectively utilizes the time,The time point being initially utilized for this object type,For
The time point that this object type is finally utilized, i.e. existsOutside time period in do not have any about this object type pair
The event that utilizes of elephant occurs;Represent the existence time that this object type object is total, whereinRepresenting should
The time point that last object of object type is released,Represent the time that first object of this object type is created
Point, i.e. existsOutside time period in there is no the object of this object type any;
Signature analysis 3: interim Memory Allocation rate
Creating of a large amount of temporary objects will cause memory source expense and the refuse collection frequently of costliness, increase what program performed
Load;Detect those object types creating a large amount of object, if keeping quoting in heap memory (is not returned by garbage collector
Receive) number of objects be far smaller than the quantity of its created object, then show this object type be likely that there are substantial amounts of temporarily
Object;Interim Memory Allocation rate (Temporary Memory Allocation Rate, TMAR) is each GC moment object class
Type keeps the mean value of ratio between the number of objects quoted and total the establishments quantity of the type, and TMAR value is the least, then illustrate interior
Deposit the possibility being used inefficiently the biggest;
The computing formula of TMAR value is:
(3)
Wherein,Representation program perform during i-th GC moment a certain object type keep quote object number () with this moment created object number () ratio,Representation program completely perform during GC number;
By above three category feature analyses, detect the suspect object type causing program internal memory poor efficiency to use;
After obtaining suspect object type, according to the object number of object type, suspicious object type is carried out importance row
Sequence;
4) context path analysis;
After obtaining there may be the suspect object type that Memory Low Usage uses problem, the contextual information provided according to MUPG
Carrying out internal memory uses propagation to analyze, and studies these object types by which program area are affected, analyzes and cause Memory Low Usage
The program area used;For reducing the resource overhead during analyzing and obtaining the key reason causing Memory Low Usage to use, only
The important object relevant to suspect object type is created address (being ranked up according to the object number size created) and object
Address (being ranked up according to the size performing number of times) is used to be analyzed;Meanwhile, when path analysis, each path is divided
Prop up and calculate its importance value W, by arranging threshold value, filter out those paths less on memory consumption impact, in obtaining causing
Deposit the critical path that poor efficiency uses;If node A is node to be analyzed, it is called by multiple father nodes, and B is a father node of A,
The then father node B importance value to child node AComputing formula be:
(4)
Wherein,Represent the number of times that between node B and node A, path performs,Represent node A father node a certain with it i it
Between path perform number of times, N represents total number of the father node of node A;The detailed process of context path analysis is: by threshold
Value, node to be analyzed and MUPG are as input, and path analysis result is as output;During path analysis, threshold value t is set,
Only when the W value of the father node of analysis node meets or exceeds t, just continue this father node is carried out path analysis;
Finally give the main program execution route causing Memory Low Usage to use.
The most according to claim 1 use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, and it is special
Levying and be, in step 1), software memory uses information to collect by software carries out static pitching pile;Concrete internal memory uses
Information includes Object Creation, method call, variables access three class event information.
The most according to claim 1 use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, and it is special
Levy and be, in step 2) in, use event type and static address to be grouped according to internal memory the memory usage information obtained
Polymerization, carries out polymerization process to the loop structure wherein comprised, and generates internal memory and uses propagation figure MUPG.
The most according to claim 1 use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, and it is special
Levy and be, in step 3), by three category feature analyses, provide the suspect object causing program internal memory poor efficiency to use for programmer
Type;Meanwhile, according to the object number of object type, suspicious object type is carried out importance ranking.
The most according to claim 1 use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, and it is special
Levy and be, in step 4), for the suspect object type detected, automatically analyze out cause its Memory Low Usage to use basic
Reason;Specifically comprise the following steps that by calculating each father node importance value W about child node, to suspect object type
When carrying out path analysis, selected threshold value t, only divide when the importance value W node more than t just proceeds context path
Analysis, finally gives the main program execution route causing Memory Low Usage to use.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610251576.4A CN105868079B (en) | 2016-04-21 | 2016-04-21 | It is a kind of to use detection method using the Java Memory Low Usage for propagating analysis based on memory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610251576.4A CN105868079B (en) | 2016-04-21 | 2016-04-21 | It is a kind of to use detection method using the Java Memory Low Usage for propagating analysis based on memory |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105868079A true CN105868079A (en) | 2016-08-17 |
CN105868079B CN105868079B (en) | 2019-02-26 |
Family
ID=56632666
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610251576.4A Expired - Fee Related CN105868079B (en) | 2016-04-21 | 2016-04-21 | It is a kind of to use detection method using the Java Memory Low Usage for propagating analysis based on memory |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105868079B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107632929A (en) * | 2017-08-21 | 2018-01-26 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus for detecting memory overflow |
CN109646949A (en) * | 2017-10-11 | 2019-04-19 | 腾讯科技(深圳)有限公司 | Object processing method, device, storage medium and electronic device |
CN112148428A (en) * | 2020-09-11 | 2020-12-29 | 北京基调网络股份有限公司 | Java virtual machine memory monitoring method, computer equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120102362A1 (en) * | 2010-10-22 | 2012-04-26 | Hitachi, Ltd. | Management system and management method |
CN102968375A (en) * | 2012-11-30 | 2013-03-13 | 中国矿业大学 | Inaccessible path detection method based on association rule mining |
-
2016
- 2016-04-21 CN CN201610251576.4A patent/CN105868079B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120102362A1 (en) * | 2010-10-22 | 2012-04-26 | Hitachi, Ltd. | Management system and management method |
CN102968375A (en) * | 2012-11-30 | 2013-03-13 | 中国矿业大学 | Inaccessible path detection method based on association rule mining |
Non-Patent Citations (1)
Title |
---|
李文杰 等: "基于对象引用关系的Java程序内存行为分析方法", 《电子学报》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107632929A (en) * | 2017-08-21 | 2018-01-26 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus for detecting memory overflow |
CN107632929B (en) * | 2017-08-21 | 2020-06-05 | 北京京东尚科信息技术有限公司 | Method and device for detecting memory leakage |
CN109646949A (en) * | 2017-10-11 | 2019-04-19 | 腾讯科技(深圳)有限公司 | Object processing method, device, storage medium and electronic device |
CN109646949B (en) * | 2017-10-11 | 2021-06-08 | 腾讯科技(深圳)有限公司 | Object processing method, device, storage medium and electronic device |
CN112148428A (en) * | 2020-09-11 | 2020-12-29 | 北京基调网络股份有限公司 | Java virtual machine memory monitoring method, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105868079B (en) | 2019-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee | Software quality factors and software quality metrics to enhance software quality assurance | |
CN103235881B (en) | A kind of nuclear reactor fault monitoring system based on minimal cut set | |
CN108647145A (en) | software memory safety detection method and system | |
CN105868116A (en) | Semantic mutation operator based test case generation and optimization method | |
CN105183796A (en) | Distributed link prediction method based on clustering | |
CN108153587B (en) | Slow task reason detection method for big data platform | |
CN106021771A (en) | Method and device for diagnosing faults | |
CN103713933B (en) | Focus function, the assemblage method of variable, apparatus and system in computer program | |
Oyetoyan et al. | A study of cyclic dependencies on defect profile of software components | |
CN103294595B (en) | A kind of software repair based on genetic algorithm | |
CN105808438A (en) | Test case reuse method based on function call path | |
CN105868079A (en) | Method for Java memory inefficient usage detection based on memory usage propagation analysis | |
CN106446688A (en) | DCR-based dynamic vulnerability detection method and system | |
CN102799960B (en) | The concurrent service flow process method for detecting abnormality of data-orlented model | |
CN105302724A (en) | Instant defect predicting method based on mixed effect removing | |
CN105930900A (en) | Method and system for predicting hybrid wind power generation | |
Verhoef et al. | Structuring modelling knowledge for CASE shells | |
CN111444079B (en) | Software defect repairing method and device | |
CN104898039A (en) | Fault propagation probability model-based fault mode preferential selection method | |
CN102521135B (en) | The method of testing of linear system and device | |
Li et al. | Computational efficiency of parallel combinatorial or-tree searches | |
CN105528296B (en) | A kind of class cluster test method of object-oriented software | |
CN112433908A (en) | Method, system, device and medium for determining interval time of detection server | |
CN101894073A (en) | Defect automatic positioning device based on control flow intersection and automatic positioning method thereof | |
CN102982282A (en) | Program bug detection system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190226 Termination date: 20200421 |